Data is the foundation of the science of Cyber Public Health. The challenge is that, even compared to the 19th century pioneers of public health and epidemiology, we have very limited access to the kind of consistent, large scale data necessary to study collective risk.
CyberGreen is committed to solving the data problem through collaboration with partners around the world and investing in the collection of publicly observable data. This data combined with meaningful metrics and scoring systems will enable experts to evaluate the effectiveness of mitigation strategies, identify the wider determinants of cybersecurity risk, and predict future outcomes.
like real medicine is possible.”
Pierre Charles Alexandre Louis
like real medicine is possible.”
Pierre Charles Alexandre Louis
like real medicine is possible.”
Pierre Charles Alexandre Louis
STATISTICS
CyberGreen currently conducts five whole-internet scans per week to assess the potential impact of DDoS attacks from open services. Our data includes weekly scans of DNS, NTP, SNMP, SSDP, and CHARGEN and can be downloaded for use by other researchers.
STATISTICS
CyberGreen currently conducts five whole-internet scans per week to assess the potential impact of DDoS attacks from open services. Our data includes weekly scans of DNS, NTP, SNMP, SSDP, and CHARGEN and can be downloaded for use by other researchers.
STATISTICS
CyberGreen currently conducts five whole-internet scans per week to assess the potential impact of DDoS attacks from open services. Our data includes weekly scans of DNS, NTP, SNMP, SSDP, and CHARGEN and can be downloaded for use by other researchers.
INTERNET INFRASTRUCTURE
HEALTH METRICS FRAMEWORK
The Internet Infrastructure Health Metrics Framework (IIHMF) is a set of models and metrics for measuring the “public health” of internet infrastructure. It will allow nations to measure their overall risk, understand how it changes over time, and take steps to mitigate that risk for their citizens.
INTERNET INFRASTRUCTURE
HEALTH METRICS FRAMEWORK
The Internet Infrastructure Health Metrics Framework (IIHMF) is a set of models and metrics for measuring the “public health” of internet infrastructure. It will allow nations to measure their overall risk, understand how it changes over time, and take steps to mitigate that risk for their citizens.
INTERNET INFRASTRUCTURE
HEALTH METRICS FRAMEWORK
The Internet Infrastructure Health Metrics Framework (IIHMF) is a set of models and metrics for measuring the “public health” of internet infrastructure. It will allow nations to measure their overall risk, understand how it changes over time, and take steps to mitigate that risk for their citizens.
FAQ
Our most ambitious project is the Internet Infrastructure Health Metrics Framework (IIHMF). The IIHMF is a set of models and metrics for measuring the “public health” of internet infrastructure. It allows nations to measure their overall risk, understand how it changes over time, and take steps to mitigate that risk for their citizens. CyberGreen scans the internet to detect those risks and bring attention to them.
CyberGreen currently scans the following services:
Service | UDP Port # |
---|---|
DNS | 53 |
NTP | 123 |
SNMP | 161 |
SSDP | 1900 |
CHARGEN | 19 |
TLS | 443 |
SMTP | 25, 465, 587, 2525 |
We publish statistics for the first five services listed above. Please visit our stats site to learn more.
CyberGreen scans the Internet to detect vulnerabilities that exist within the cyber ecosystem in an effort to compile data and statistics regarding the state of global Cyber Public Health. The cyber ecosystem is composed of any device which connects to the Internet, for example, but not limited to: clients, servers, virtual instances, embedded systems, and the Internet of Things. At CyberGreen, our work hinges on high quality, reliable data to enable us to provide the most accurate measurements and visualizations.
In the past, some data sets had been highly volatile, with a large replacement rate for IP addresses in consecutive scans. At that time, we identified a need to cross-reference multiple data sources, as different techniques provide different results. Hence, the start of our in-house scanning in 2017. And while this sort of data, in its essence, will always be imperfect, CyberGreen seeks to better understand and analyze the imperfections rather than to rely on assumption.
By conducting our own scans at CyberGreen, we can hold true to our value of transparency by devising our own scanning method and publishing that method for the broader community. By doing so, our hope is to elicit feedback and maintain trust as we endeavor to make the cyber ecosystem a healthier place for the global good.
- CyberGreen conducts seven internet scans per week, each of which focuses on a different service (DNS, NTP, SNMP, SSDP, CHARGEN, TLS, and SMTP).
- CyberGreen does not scan unscannable space (e.g., RFC 1918 addresses, multicast or future use addresses
- CyberGreen does not scan addresses which have opted out of scanning
- The addresses are assigned fixed DNS names of the form scannerX.scanning.cybergreen.net, where X is a number.
- CyberGreen does not publicly release individual host vulnerability information; we publish aggregate information as shown on https://stats.cybergreen.net.
Over time, our intent is to add more scans to this set to identify other vulnerabilities and risk. Our intention is not to cause disruption to networks. As always, CyberGreen values the engagement of the community to help us move forward in the most constructive and unobtrusive way.
Our engagement policy lays out the following principles:
- CyberGreen’s constant goal is gold standard — where the standards exist, follow them. Where the standards don’t exist, define them. This includes both research and community engagement. We are, after all, committed to helping the community.
- CyberGreen seeks community involvement. The accuracy and quality of our data requires buy-in and cooperation from the scanners. The more actively they are involved, the better. If you are scanning the Internet, contact us about data partnership.
- CyberGreen will always be crystal-clear in communicating our intents, and in following the intents of those we engage with. In particular, if your organization wants to not be scanned by CyberGreen, we actively encourage you to contact us via our opt-out form rather than blocking our scanners. Blocking the scans introduces false negatives, as we cannot distinguish between a policy decision to protect the network and the absence of vulnerable hosts.
CyberGreen’s engagement policy is focused on providing the rest of the Internet a clear understanding of our goals, access to our data, and a mechanism for positively supporting or disengaging from our efforts.
We are currently working on collecting data and producing metrics for additional components as part of our comprehensive IIHMF project. In the meantime, CyberGreen has published metrics for calculating the risk that five open services pose. We focus on open DNS, NTP, SNMP, SSDP, and CHARGEN services.
Version 2.0 – Risk to Others
simple counts | weight j = 1 ∀ j
Version 2.0 reports a crude measure of DDoS risk to others by country, by Autonomous System (AS), and by such alternate entities (e.g., enterprises) as seem relevant. That crude measure is the count of nodes within the scope of control of the country, the AS, or the entity otherwise defined that have the configuration that allows them to participate in a DDoS. The count will be reported by protocol and in sum across all four protocols. Countries, ASs, and alternate entities will be ranked by the count of nodes available to the operator of a DDoS amplification attack, i.e.,a rank of 1 is that of the highest risk. It is that rank that is the v2.0 CyberGreen Index value.
In short, the v2.0 CyberGreen Index equates risk to others to the size of unmet mitigation tasks required to zero the country’s, the AS’s, or the alternate entity’s risk to others.
Version 2.1 – Offensive Potential
+ amplification factor | weight j = AF j
CyberGreen’s v2.1 metrics report risk to others in terms of “How bad could it be?” This means that CyberGreen v2.1 metrics factor in the scale potential for amplification by protocol by node. Whereas the v2.0 Index is a rank order by the size of the unmet mitigation need, the v2.1 Index is a rank order by the size of the DDoS that could be mounted from the country, the AS, or the alternate entity should all of their nodes currently available to attackers were to be used in a single attack. In short, the v2.1 Index measures “offensive potential” — with the obvious caveat that we do not mean intentional offense but rather the degree to which the country, the AS, or the alternate entity can be made to engage in offense whether it wanted to or not.
At the moment, our focus is on measurement rather than mitigation. At a high level, for open services, we suggest the following:
For systems developers: Default configurations should not ship with services open unless needed.
For systems operators: There should be processes in place for checking deployed configurations and turning off unneeded services. There should also be mechanisms to detect potential abuse or abnormal behavior such as traffic volume monitoring.
For more details, please contact us.
CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).
While the purpose of our scans is benevolent in nature, CyberGreen recognizes and respects the rights of users who wish to opt out of the process. If you wish to opt out CyberGreen’s scans, please use our opt-out form. If you want to talk with us about our scans, please contact us.
Opt Out of CyberGreen Scanning
CyberGreen helps policy makers and Computer Security Incident Response Teams (CSIRTs) focus their remediation efforts on key systemic risks; to help understand where improvements can be made and how, together, we can achieve a more sustainable, secure, and resilient cyber ecosystem.
If you would not like CyberGreen to scan your IP address or range of addresses, please complete this form. We require a valid email address linked to the IP to verify ownership of the address. Generally, an IP address will be removed within 24 hours (unless otherwise specified).
If you require further help to remove your IP address from CyberGreen scanning, please contact us.